Efficient ID-based Threshold Signature in P2P and MANETs

被引:0
作者
Liu Zhiyuan [1 ]
Feng Yunfang [1 ]
Li Jun [2 ]
机构
[1] Huangshi Inst Technol, Coll Comp, Huangshi 435003, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Tech, Wuhan 430074, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
threshold signature; non-interactive; P2P; MANET;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Threshold cryptography distributes the ability to provide a cryptographic service such as decryption or signing. It is an ideal choice to provide security services, such as authentication and access control, in MANETs or P2P systems. The paper proposes an ID-based threshold signature scheme, which has three attractive properties: (1) The user's co-signing key and signature share are all verifiable, which make the scheme robust. (2) The signature share psi is constant and has small size; it does not lengthen with the increase of the group members. (3) The process of generating signature share psi is non-interactive, so it does not require a synchronous communications network. So the scheme can be efficiently used in providing security set-vices in MANETs.
引用
收藏
页码:4884 / +
页数:2
相关论文
共 15 条
  • [1] [Anonymous], 1999, IEEE NETWORK MAGAZIN
  • [2] Bellare M., 1993, CCS 93 P 1 ACM C COM, P62, DOI DOI 10.1145/168588.168596
  • [3] DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
  • [4] FELDMAN P, 1987, P 28 IEEE S FDN COMP, P427
  • [5] Gennaro R, 1996, LECT NOTES COMPUT SC, V1070, P354
  • [6] Herzberg A, 1995, LECT NOTES COMPUT SC, V963, P339
  • [7] Jarecki S., 2004, ACM WORKSH SEC AD HO
  • [8] KONG J, 2001, IEEE 9 INT C NETW PR
  • [9] Adaptive security for multilevel ad hoc networks
    Kong, JJ
    Luo, HY
    Xu, KX
    Gu, DL
    Gerla, M
    Lu, SW
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05) : 533 - 547
  • [10] Luo Haiyun, 2004, IEEE ACM T NETWORKIN